Web3 Foundation Wonderland analyzed the attack on Keep3r Network V1, an on-chain service outsourcing network. The attacker managed to obtain a whitelisted Keep3r task governance because it was a Vanity address. Then, the attacker added liquidity to the task, almost Days later, take a flash loan from Balancer and operate the Sushi LP pool, and then call the ApplyCreditStojob function, which calculates the credit for the amount of liquidity that the task should get. Due to the manipulation, the attacker gets 4084.27 KP3R credits (instead of 537.89). The attacker finally managed to drain the points and keep them for himself.